Protocols

Results: 23793



#Item
111

IEEE INFOCOMIEEE Conference on Computer Communications Software Defined Monitoring of Application Protocols Luk´asˇ Kekely, Viktor Puˇs

Add to Reading List

Source URL: www.liberouter.org

Language: English - Date: 2014-09-23 08:10:00
    112

    Multnomah County Amateur Radio Emergency Service Standard Operating ProcedureOperating Protocols Goal

    Add to Reading List

    Source URL: www.multnomahares.org

    Language: English - Date: 2017-02-19 15:49:46
      113

      DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice Vincent Cheval, Steve Kremer, Itsaka Rakotonirina Inria & LORIA Abstract—Automated verification has become an essential part

      Add to Reading List

      Source URL: anr17-tecap.gforge.inria.fr

      Language: English - Date: 2018-02-12 05:14:30
        114

        A Tradeo Between Information and Communication in Broadcast Protocols (Revised version) Baruch Awerbuch 1 Oded Goldreich 2 David Peleg 3 Ronen Vainish 2

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        Language: English - Date: 2014-06-22 06:24:10
          115

          Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

          Add to Reading List

          Source URL: www-kb.is.s.u-tokyo.ac.jp

          Language: English - Date: 2008-12-22 04:20:35
            116

            Verification of Population Protocols Javier Esparza Technical University of Munich Joint work with Pierre Ganty, J´erˆome Leroux, and Rupak Majumdar

            Add to Reading List

            Source URL: www7.in.tum.de

            Language: English - Date: 2015-09-15 08:28:52
              117

              Cryptographic schemes Protocols Specifications of primitives

              Add to Reading List

              Source URL: prosecco.gforge.inria.fr

              Language: English - Date: 2014-11-25 03:59:23
                118

                On Secrecy Amplification Protocols ˇ Radim Oˇsˇt´ adal, Petr Svenda, and V´aclav Maty´aˇs {svenda, matyas}@fi.muni.cz

                Add to Reading List

                Source URL: crocs.fi.muni.cz

                Language: English - Date: 2015-08-17 10:26:06
                  119

                  Tribal Domestic Violence Courts and Dockets: Protocols and Policies Bonnie Clairmont, Victim Advocacy Program Specialist, Tribal Law and Policy Institute Hon. Kelly Gaines Stoner, Victim Advocacy Legal Specialist, Triba

                  Add to Reading List

                  Source URL: www.tribal-institute.org

                  Language: English - Date: 2018-05-11 19:51:05
                    120

                    Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. Analysing the vulnerability of protocols to produce known-pair and chosen

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk.

                    Language: English - Date: 2009-02-25 10:33:24
                      UPDATE